Updates from July, 2009 Toggle Comment Threads | Keyboard Shortcuts

  • ancavge 9:20 pm on July 17, 2009 Permalink | Reply
    Tags: , , banker bailout, breakdown, , food riots, Hank Paulson, Law and Order, Stephen Foley,   

    Paulson: Law and Order Breakdown, Food Riots If Banker Bailout Not Passed 

    Stephen Foley
    The Independent
    July 17, 2009
    • A d v e r t i s e m e n t
    • efoods

    The Bush administration and Congress discussed the possibility of a breakdown in law and order and the logistics of feeding US citizens if commerce and banking collapsed as a result of last autumn’s financial panic, it was disclosed yesterday.

    Making his first appearance on Capitol Hill since leaving office, the former Treasury secretary Hank Paulson said it was important at the time not to reveal the extent of officials’ concerns, for fear it would “terrify the American people and lead to an even bigger problem”.

    Mr Paulson testified to the House Oversight Committee on the Bush administration’s unpopular $700bn (£426bn) bailout of Wall Street, which was triggered by the failure of Lehman Brothers last September. In the days that followed, a run on some of the safest investment vehicles in the financial markets threatened to make it impossible for people to access their savings.

    Read entire article

    URL to article: http://www.infowars.com/paulson-law-and-order-breakdown-food-riots-if-banker-bailout-not-passed/

     
  • ancavge 9:18 pm on July 17, 2009 Permalink | Reply
    Tags: eco-towns, , , Jill Sherman,   

    Brown’s Eco Towns Will Increase Rather Than Reduce Pollution 

    Jill Sherman
    Times Online
    July 17, 2009
    • A d v e r t i s e m e n t
    • efoods

    Ministers gave approval yesterday for the building of four “pioneer” eco-towns and insisted that at least 10,000 homes would be in place by 2016 in the face of local opposition.

    Despite the depth of the recession and fierce local protests, John Healey, the Housing Minister, approved sites in Oxfordshire, Norfolk, Cornwall and Hampshire. The chosen developers for Gordon Brown’s flagship programme will each be able to bid for part of a £60 million pot of extra cash.

    Rural campaigners warned that the zero-carbon developments would threaten greenfield sites and local wildlife. There were also concerns that without more public transport, the extra traffic would increase rather than reduce pollution.

    Read entire article

    URL to article: http://www.infowars.com/browns-eco-towns-will-increase-rather-than-reduce-pollution/

     
  • ancavge 9:15 pm on July 17, 2009 Permalink | Reply
    Tags: 1.5 million, , , , ,   

    Foreclosure Filings in U.S. Reach Record 1.5 Million 

    Dan Levy
    Bloomberg
    July 17, 2009
    • A d v e r t i s e m e n t
    • efoods

    U.S. foreclosure filings hit a record in the first half, a sign that job losses and falling property prices deepened the housing recession, according to RealtyTrac Inc.

    More than 1.5 million properties received a default or auction notice or were seized by banks in the six months through June, the Irvine, California-based seller of default data said today in a statement. That’s a 15 percent increase from the year earlier. One in 84 U.S. households received a filing.

    “People are losing their jobs, seeing their income go down and are underwater on their mortgage,” Richard Green, director of the Lusk Center for Real Estate at the University of Southern California in Los Angeles, said in an interview. “It’s a toxic combination.”

    Read entire article

    URL to article: http://www.infowars.com/foreclosure-filings-in-u-s-reach-record-1-5-million/

     
  • ancavge 9:14 pm on July 17, 2009 Permalink | Reply
    Tags: AARP, , , , , , , , spend   

    Biden: Only Way to Avoid Bankruptcy is to Spend Money 

    Penny Starr
    CNSNews
    July 17, 2009
    • A d v e r t i s e m e n t
    • efoods

    Vice President Joe Biden told people attending an AARP town hall meeting that unless the Democrat-supported health care plan becomes law the nation will go bankrupt and that the only way to avoid that fate is for the government to spend more money.

    “And folks look, AARP knows and the people with me here today know, the president knows, and I know, that the status quo is simply not acceptable,” Biden said at the event on Thursday in Alexandria, Va. “It’s totally unacceptable. And it’s completely unsustainable. Even if we wanted to keep it the way we have it now. It can’t do it financially.”

    “We’re going to go bankrupt as a nation,” Biden said.

    Read entire article

    URL to article: http://www.infowars.com/biden-only-way-to-avoid-bankruptcy-is-to-spend-money/

     
  • ancavge 9:10 pm on July 17, 2009 Permalink | Reply
    Tags: , emergency police, , , , Wausau, WSAW 7   

    Wausau Cops Enlist “Emergency Police” Volunteers 

    WSAW 7
    July 17, 2009
    • A d v e r t i s e m e n t
    • efoods

    Area law enforcement usually can handle the toughest situations they face.

    But that doesn’t mean there aren’t times that they need a little more help.

    The Emergency Police helps assist the Wausau Police Department during times that require more personnel.

    Dwayne Dachel, a Patrol Captain with the Wausau Police Department says such duties include traffic control for parade routes and crowd control for special events like the fair.

    They also assist police by protecting big crime scenes.

    “Anything we need a lot of assistance for, we don’t have the officers, we don’t have the capability, ” said Dachel. “[They] All volunteer, they don’t get paid anything but they put in a tremendous amount of hours.”

    If you would like to become an emergency police officer. You can can pick up an application at the Wausau Police Department front desk.

    URL to article: http://www.infowars.com/wausau-cops-enlist-emergency-police-volunteers/

     
  • ancavge 9:06 pm on July 17, 2009 Permalink | Reply
    Tags: Denounces Ginsberg, , , , Joseph Pitts, ,   

    Rep. Denounces Ginsberg Eugenics Comment on House Floor 

    Kurt Nimmo
    Infowars
    July 17, 2009

    Rep. Joseph Pitts, a Republican from Pennsylvania, had a strong reaction to Supreme Court Justice Ruth Bader Ginsburg’s comments about doing away with useless eaters “we don’t want to have too many of.” Pitts declared Ginsburg’s “eugenics way of thinking debases all human life” and he expressed shock that a Supreme Court justice would suggest certain categories of people are not worthy of life and should have been aborted.

    On July 9, Infowars posted an article about Ginsburg’s comments that were contained in a New York Times interview. At the time, there was a prevailing and yet predictable silence on the part of the corporate media in response to the SCOTUS eugenicist.

    “The mainstream media has been missing in action once again, by completely ignoring an astonishing comment made by Supreme Court Justice Ruth Bader Ginsburg concerning the ostensible reasons — in her opinion, rooted in eugenics — for the ruling in Roe v. Wade,” John Kinsellagh wrote for the Examiner on July 13.

    On July 14, a blog on the U.S. News & World Report website attempted to explain Ginsburg’s “curious comment.” Dan Gilgoff mentioned that “conservatives” have “pounced on the lines as evidence that Ginsburg supports eugenics, or selective human breeding.” Gilgoff added that there was “much less chatter about this on liberal blogs, but Media Matters argues that Ginsburg was speaking about public opinion about Roe and abortion, not about her own opinion.”

    In other words, according to Media Matters, it is not Ginsberg who is the eugenicist, but the American people.

    “Ginsburg isn’t 100 percent clear that she’s personally sympathetic to the view that abortion should be used to control the growth of certain populations,” Gilgoff concludes.

    • A d v e r t i s e m e n t
    • efoods

    The notorious neocon editorialist Jonah Goldberg, writing for the Los Angeles Times on July 14, frames Ginsburg’s comments all too predictably. “One senses that if Antonin Scalia had offered such a comment, a Times interviewer would have sought more clarity, particularly on the racial characteristics of these supposedly unwanted populations,” he writes. Goldberg should be lauded for mentioning eugenics and Margaret Sanger. However, the neocon is more interested in bashing so-called “liberals” (Goldberg considers himself a “conservative”) and less interested in exposing the fact that support for eugenics is not divided by political partisanship and is an exhaustively documented fetish of the ruling elite and their minions such as Ginsburg.

    Goldberg cannot resist rolling Sonia Sotomayor into the mix. “I for one would like to know whether Ginsburg believes there were — or are — some populations in need of shrinking through abortion and whether she thinks such considerations have any place at the Supreme Court,” he writes. “And while we’re at it, it would be interesting to know what Supreme Court nominee Sonia Sotomayor thinks about such things.”

    In fact, eugenics has nothing to do with Sonia Sotomayor, supposed liberals or self righteous neocon-conseravtives like Jonah Goldberg — in the modern context, it was created and supported by the aristocratic and wealthy elite of America and Europe, the same people who created the false right-left paradigm Goldberg so predictably falls for (one might conclude it is his life’s calling).

    As Daniel Taylor notes, modern eugenics was fostered primarily by the Rockefellers and the Carnegies. In 1902, Andrew Carnegie founded the Carnegie Institute and funded the Eugenics Record Office in America. The office operated from Cold Spring Harbor in New York. Eugenics policies, which led to the sterilization of thousands of Americans, were developed there. In 1973, the Rockefeller Foundation again gave $500,000 to the Population Council and $25,000 to the Population Crisis Committee, while the Rockefeller Brothers Fund gave $250,000 to the Population Council, and $250,000 to the Population Institute.

    Abortion is at the very center of the modern eugenics movement. “Birth control and abortion are turning out to be great eugenic advances of our time,” declared Frederick Osborn of the Society for the Study of Social Biology in 1973 (the organization had changed its name from the American Eugenics Society). “If they had been advanced for eugenic reasons it would have retarded or stopped their acceptance.”

    Osborn was put in charge of the Population Council, a group organized and funded by John D. Rockefeller III. In 1956, Osborn addressed the British eugenics society and affirmed his belief in “Galton’s dream” and proposed what he called “voluntary unconscious selection” by changing laws, customs and social expectations, according to Rebecca R. Messall. Sir Francis Galton is considered the father of the eugenics movement.

    Ruth Bader Ginsburg’s comments provide a small window into the diabolical thinking of her masters. It is wholly predictable the corporate media and “liberal” and “conservative” bloggers have attempted to render it a political football instead of revealing the true nature of eugenics — it is the ultimate dream of the ruling elite to cull the useless eaters and the unwanted herd and political ideology is entirely secondary to the realization of their horrific and genocidal dream.

    URL to article: http://www.infowars.com/rep-denounces-ginsberg-eugenics-comment-on-house-floor/

     
  • ancavge 9:01 pm on July 17, 2009 Permalink | Reply
    Tags: AK-47, , dealership, , , purchase, , ,   

    Missouri Dealership Gives Away AK-47 With Purchase of New Truck 

    CNN
    July 17, 2009

    URL to article: http://www.infowars.com/missouri-dealership-gives-away-ak-47-with-purchase-of-new-truck/

     
  • ancavge 8:15 pm on July 17, 2009 Permalink | Reply
    Tags: , , cyberterrorism, , , ,   

    9/11 and Cyberterrorism: Did the real “cyber 9/11″ happen on 9/11? 

    James Corbett
    The Corbett Report
    July 17, 2009

    Government sources immediately began blaming North Korea for the recent cyberterror attacks on South Korea and the U.S., despite having no evidence to back up those claims. Now, an examination of the evidence by independent computer experts show that the attack seems to have been coordinated from the UK. The hysterical media coverage in the attack’s wake, however, echoing the government line that it was likely the work of North Korea, served to cement in the minds of many that this was an act of cyberwarfare.

    september 11   9/11 and Cyberterrorism: Did the real cyber 9/11 happen on 9/11?
    McConnell
    Back in 2003, Mike McConnell, the ex-director of the National Security Agency (NSA), was fearmongering over the possibility of a cyber attack “equivalent to the attack on the World Trade Center” if a new institution were not created to oversee cyber security.

    The idea that this surprisingly unsophisticated attack could have come from a well-organized, hostile state or terrorist group comes as a blessing in disguise to those groups, agencies and advisors who have been calling for greater and greater federal snooping powers in the name of stopping a “cyber 9/11″ from happening.

    The “cyber 9/11″ meme stretches back almost to 9/11 itself. Back in 2003, Mike McConnell, the ex-director of the National Security Agency (NSA), was fearmongering over the possibility of a cyber attack “equivalent to the attack on the World Trade Center” if a new institution were not created to oversee cyber security. Since then, report after report has continued to use the horror of 9/11 as a way of raising public hysteria over “cyber terrorism,” a subject more often associated with juvenile hackers and lone misfits than radical terrorist organizations.

    The real reason behind the invocation of 9/11 in the context of “cyber terror” was revealed last year by Harvard law professor Lawrence Lessig. He told a technology conference that former counterterrorism czar Richard Clarke admits there is a cyber equivalent of the constitution-destroying Patriot Act ready to be rubber stamped into law; all it requires is a “cyber 9/11″ to make such legislation politically viable. In effect, the cyber security establishment—the advisors, agents and experts in the newly-minted multi-billion dollar cyber security industry—are waiting for a spectacular cyber terrorist attack to go ahead with plans for ‘identity management’ schemes like fingerprinting for internet access which would put an end to the free Internet as we have known it.

    What the cyber security establishment does not want you to know is that the most incredible cyber terrorist story of all time began 15 years ago. And it centers on 9/11. The establishment is interested in suppressing this story because it demonstrates that the very investigative bodies that are clamoring for more power on the pretext of the “cyber terror” hysteria are the exact same bodies that failed to investigate the documentable links between government-designated terrorists and a software company with direct access to some of the most sensitive computer systems in the United States. FBI agents whose investigation into this story were suppressed have even said that these investigations could have prevented 9/11.

    It is a story of international terror and terrorist financiers. It stretches from New England to Saudi Arabia and involves businessmen, politicians and terror networks. And it begins in the most unlikely of places: the offices of an enterprise architecture software firm in Quincy, Massachusetts.

    Enterprise Architecture: The God’s-Eye View of Systems and Infrastructure

    “Enterprise architecture software” refers to a computer program that allows someone to look at all of the data produced throughout an organization’s structure in real time. This effectively gives the program user a god’s-eye view of an enterprise, allowing for the mapping, visualization and analysis of all transactions, interactions, systems, processes and personnel in the entirety of a business or agency. This type of software could, for example, be used for robust business modeling, allowing for extremely detailed and accurate projections of how changes in an organization’s structure or processes would effect a business’ bottom line. What would happen if two departments were merged, for example, or if a business were to outsource one of its processes.

    As this software began to mature in the 1990s, however, it went from a merely useful tool to something truly incredible. Sophisticated enterprise architecture software could, for example, examine all of the transactions taking place across a financial institution in real time and examine that data for possible money laundering operations or rogue traders. Such software could even have potentially detected and identified the insider trading leading up to 9/11. Combined with rudimentary a.i. capabilities, such a program would not only be able to alert the appropriate personnel about such transactions, but even stop them as they are happening. If the software were sophisticated enough, it may even be able to identify the possibility of such transactions before they happen.

    The utility of such software for organizations of all stripes should be obvious enough. It is unsurprising, then, that numerous government agencies and powerful corporations were hungry for this software in the 1990s. A surprising number of them, including DARPA, the FBI, the Secret Service, the White House, the Navy, the Air Force, the FAA, NATO, IBM, Booz Allen Hamilton and Price Waterhouse Coopers (amongst many others) turned to a small New England-based software firm called Ptech.

    Ptech: Not Your Average Software Firm

    Ptech was founded in Quincy, Mass. in 1994 and by 1996 had secured a contract with DARPA to help transfer commercial software methodologies to the defense sector. In 1997, it gained security clearance to bid on sensitive military contracts and bid on work for a range of other government agencies. Within four years Ptech had built up a stable of clients that would make any third-party software vendor green with envy. From the inner sanctum of the White House to the headquarters of the FBI, from the basement of the FAA to the boardroom of IBM, some of the best-secured organizations in the world running on some of the most protected servers housing the most sensitive data welcomed Ptech into their midst. Ptech was given the keys to the cyber kingdom to build detailed pictures of these organizations, their weaknesses and vulnerabilities, and to show how these problems could be exploited by those of ill intent. For all of its incredible success, however, many of the firm’s top investors and employees were men with backgrounds that should have been raising red flags at all levels of the government.

    The firm was founded on $20 million of startup money, $5 million of which was provided by Yassin al-Qadi, a wealthy and well-connected Saudi businessman who liked to brag about his acquaintance with Dick Cheney. He also had connections to various Muslim charities suspected of funding international terrorism. In the wake of 9/11 he was officially declared a Specially Designated Global Terrorist by the U.S. government and his assets were frozen. At the time, Ptech’s owners and senior management denied that al-Qadi had any involvement with the company other than his initial investment, but the FBI now maintains they were lying and that in fact al-Qadi continued investing millions of dollars in the company through various fronts and investment vehicles. Company insiders told FBI officials that they were flown to Saudi Arabia to meet Ptech’s investors in 1999 and that al-Qadi was introduced as one of the owners. It has also been reported that Hussein Ibrahim, Ptech’s chief scientist, was al-Qadi’s representative at Ptech and al-Qadi’s lawyers have admitted that al-Qadi’s representative may have continued to sit on Ptech’s board even after 9/11.

    Ibrahim himself was a former president of BMI, a New Jersey-based real estate investment firm that was also one of the initial investors in Ptech and provided financing for Ptech’s founding loan. Ptech leased office space and computer equipment from BMI and BMI shared office space in New Jersey with Kadi International, owned and operated by none other than Ptech’s sweetheart investor and Specially Designated Global Terrorist, Yassin al-Qadi. In 2003, counterterrorism czar Richard Clarke said: “BMI held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support.”

    • A d v e r t i s e m e n t
    • efoods

    Suheil Laheir was Ptech’s chief architect. When he wasn’t writing the software that would provide Ptech with detailed operational blueprints of the most sensitive agencies in the U.S. government, he was writing articles in praise of Islamic holy war. He was also fond of quoting Abdullah Azzam, Osama Bin Laden’s mentor and the head of Maktab al-Khidamat, which was the precursor to Al-Qaeda.

    That such an unlikely cast of characters were given access to some of the most sensitive agencies in the U.S. federal government is startling enough. That they were operating software that allowed them to map, analyze and access every process and operation within these agencies for the purpose of finding systemic weak points is equally startling. Most disturbing of all, though, is the connection between Ptech and the very agencies that so remarkably failed in their duty to protect the American public on September 11, 2001.

    Ptech on 9/11: The Basement of the FAA

    For two years prior to 9/11, Ptech was working to identify potential problems or weaknesses in the FAA’s response plans to events like a terrorist hijacking of a plane over U.S. airspace. According to their own business plan for their contract with the FAA, Ptech was given access to every process and system in the FAA dealing with their crisis response protocols. This included examining key systems and infrastructure to analyze the FAA’s “network management, network security, configuration management, fault management, performance management, application administration, network management and user desk help operations.” In short, Ptech had free reign to examine every FAA system and process for dealing with the exact type of event that was to occur on 9/11. Even more incredible, researcher Indira Singh points out that Ptech was specifically analyzing the potential interoperability problems between the FAA, NORAD and the Pentagon in the event of an emergency over U.S. airspace.

    Ptech also presumably had operational information about the systems that the FAA, NORAD and others employed during crisis response exercises like Vigilant Guardian, the NORAD exercise that was taking place on 9/11 and included simulations of hijacked jets being flown into New York and hijacked jets being flown into government buildings. This is significant because there is every indication that just such drills were confusing NORAD’s response to the real hijackings that were taking place that day. As researcher Michael Ruppert points out, a rogue agent with access to a Ptech backdoor into the FAA’s systems could have been deliberately inserting fake blips onto the FAA’s radars on 9/11. That scenario would explain the source of the phantom Flight 11 that the FAA reported to NORAD at 9:24 a.m. (well after Flight 11 had already hit the World Trade Center), a report whose source the 9/11 Commission claims they were unable to find.

    In short, Ptech’s software was running on the critical systems responding to the attacks of 9/11 on 9/11 itself. The software was designed for the express purpose of giving its users a complete overview of all the data flowing through an organization in real time. The father of enterprise architecture himself, John Zachman, explained that with Ptech-type software installed on a sensitive server “You would know where the access points are, you’d know how to get in, you would know where the weaknesses are, you’d know how to destroy it.”

    Stifled Investigations

    In the late 1990s, Robert Wright—an FBI special agent in the Chicago field office—was running an investigation into terrorist financing called Vulgar Betrayal. From the very start, the investigation was hampered by higher-ups; the investigation was not even allocated adequate computers to carry out its work. Through Wright’s foresight and perseverance, however, the investigation managed to score some victories, including seizing $1.4 million in U.S. funds that traced back to Yassin al-Qadi. Wright was pleased when a senior agent was assigned to help investigate “the founder and the financier of Ptech“, but the agent did no work and merely pushed papers during his entire time on the case.

    Shortly after the 1998 African embassy bombings, Vulgar Betrayal began to uncover a money trail linking al-Qadi to the attack. According to Wright, when he proposed a criminal investigation into the links, his supervisor flew into a rage, saying “‘You will not open criminal investigations. I forbid any of you. You will not open criminal investigations against any of these intelligence subjects.” Wright was taken off the Vulgar Betrayal investigation one year later and the investigation itself was shut down the following year.

    In the aftermath of 9/11, Indira Singh—a risk management conultant for JP Morgan—was looking for enterprise architecture software to implement the next generation of risk management at the financial juggernaut. Impressed by their client list, Singh invited Ptech to demonstrate their software. It wasn’t long before she began discovering the connections between Ptech and international terrorist financing. She worked exhaustively to document and uncover these links in an effort to persuade the FBI in Boston to open their own investigation into Ptech, but she was told by one agent that she was in a better position to investigate this than someone inside the FBI. Despite the persistent efforts of Singh and the testimony of company insiders, the FBI did not inform any of the agencies contracting with Ptech that there were concerns about the company or its software.

    In late 2002, Operation Green Quest—a Customs Department-led multi-agency investigation into terrorist financing—raided Ptech’s offices due to its ties to al-Qadi and others. The very same day of the raid White House Press Secretary Ari Fleischer declared the company and its software safe. Mainstream news articles defending Ptech after the story broke, however, blithely admit that the company was informed of the raid weeks in advance, hoping perhaps that readers will not notice that his completely defeats the purpose of such a raid or calls into question its results. Eventually, Michael Chertoff led an effort to give the FBI total control over Greenquest, leading to Customs officials accusing him of sabotaging the investigation. No indictments were laid in the immediate aftermath of the Ptech raid against al-Qadi or anyone else related to the company. Chertoff went on to become the head of Homeland Security.

    The 9/11 Commission Report, obviously, does not mention Ptech. Given the incredible information about this company and its links to Specially Designated Global Terrorist Yassin al-Qadi, this is perhaps surprising. This startling omission becomes more ominous however, when it is understood that the 9/11 Commission co-chair, Thomas Kean, made $24 million dollars off a land deal with al-Qadi linked organization BMI.

    For over a decade, investigations into Ptech, its employees and its investors have been stifled, suppressed or derailed by people in key positions. But all of that finally changed this week.

    A Break in the Case

    On Wednesday the Boston Field Office of the FBI unsealed a 2007 indictment of Oussama Ziade, Ptech’s former CEO, and Buford George Peterson, the former CFO and COO. The indictment charges that the pair knowingly lied to investigators about the extent of al-Qadi’s investments and ties with Ptech. Another unsealed indictment, this one from 2005, alleges Ziade attempted to engage in transactions involving al-Qadi’s property, a federal offence as al-Qadi was a Specially Designated Global Terrorist at the time. If the pair are convicted on the charges, they face 30 years in prison and a $1 million fine.

    Whether this represents a significant breakthrough in the case and the beginning of the official unraveling of the Ptech story will likely depend on whether political pressure is brought to bear by an informed public who are concerned with this story. Given that the public has been whipped into cyber-hysteria over the North Korean figments of the government’s imagination, it will require the media to stop parroting the government’s talking points and begin informing the public about the very real, documentable links between terrorist financiers and the technological capability to override key emergency response systems on 9/11.

    Two questions remain to be answered: Did the real “cyber 9/11″ happen on 9/11? And will the public care enough to demand the answer to that question? If the answer to either question is ‘yes,’ concerned readers are advised to download the mp3 file of Episode 045 of The Corbett Report podcast, “Ptech and the 9/11 software,” and begin distributing it to others to bring awareness to this incredible story.

    URL to article: http://www.infowars.com/911-and-cyberterrorism-did-the-real-cyber-911-happen-on-911/

     
  • ancavge 8:12 pm on July 17, 2009 Permalink | Reply
    Tags: Adrian Covert, , , , , ,   

    Army’s High-Tech Infantry Unit Set to Touch Down in Afghanistan 

    Adrian Covert
    Popular Science
    July 17, 2009
    • A d v e r t i s e m e n t
    • efoods

    Each equipped with $48,000 worth of GPS components, electronic maps, and wearable computers, troops of the Army’s 5th Brigade, 2nd Infantry Division are heading to Afghanistan as part of the resurrected Land Warrior program. The Army is hoping the revised, eight-pound set of gear will be more beneficial than when the $500 million program was canceled in 2006.

    As the latest futuristic military program to be made real, Land Warrior gear will allow troops to identify comrades and enemies on the battlefield, receive updated objectives, locate buildings and find the nearest exit–all through a head-mounted eyepiece.

    This is the long-awaited realization of the Army’s 15 year plus program to help out troops who were previously buying their own walkie-talkies and GPS units to stay in contact with their team.

    The problem is, not everyone finds it helpful.

    Read entire article

    URL to article: http://www.infowars.com/armys-high-tech-infantry-unit-set-to-touch-down-in-afghanistan/

     
  • ancavge 8:10 pm on July 17, 2009 Permalink | Reply
    Tags: criminalized, Leon Symons, , The Jewish Chronicle, Zionists   

    Comparing Zionists to Nazis to be Criminalized 

    Leon Symons
    The Jewish Chronicle
    July 17, 2009
    • A d v e r t i s e m e n t
    • efoods

    Parliament will be asked to consider whether the use of Nazi symbols and terms in reference to Jews, Israel and Zionism is breaking the law on incitement to racial hatred.

    A new report by the European Institute for the Study of Contemporary Antisemitism (EISCA) has highlighted the increasing use of what it terms the “Nazi card” in antisemitic discourse and has called for a number of measures to try to combat its spread.

    “Playing the Nazi card” has been defined in the report as the use of Nazi-related terms or symbols — for example intertwining the swastika with the Star of David — while negatively referring to Jews, Israel, Zionism or other aspects of what it calls the Jewish experience.

    The report, which was jointly published by EISCA and the Department for Communities and Local Government, recommends that the Home Office, the Association of Chief Police officers (ACPO) and the Crown Prosecution Service should prepare new guidance for the police on whether this kind of terminology amounts to incitement.

    Read entire article

    URL to article: http://www.infowars.com/comparing-zionists-to-nazis-to-be-criminalized/

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel
Follow

Get every new post delivered to your Inbox.